logo

The advancement of the technology

   

Added on  2022-08-20

4 Pages466 Words13 Views
Running head: INTEGRITY VS. CONFIDENTIALITY
INTEGRITY VS. CONFIDENTIALITY
Name of the Student:
Name of the University:
Author note:

INTEGRITY VS. CONFIDENTIALITY1
Does information confidentiality imply information integrity?
With the advancement of the technology, new security issues are emerging on a daily
basis. With the evolution of the cloud based information system the integrity and the
confidentiality of the data is completely at a threat. According to CIA triad, confidentiality,
integrity and availability of the data is considered while taking certain measures in the security
(Covert et al., 2020).
As per the definition of information integrity, it is the way in which the consistency,
accuracy and the reliability of the processes, systems and the content of the information is
maintained. This does not means that the data is confidential. Confidentiality on the other hand is
referred to as the process of protecting information from the third party access. The people with
authorized access is capable of accessing the confidential data.
Thus it can be said that the integrity of the data does not implies confidentiality as,
integrity is the process of protecting the data from the unauthorized changes in it such that the
entire data that is provided is reliable and accurate, whereas, confidentiality is a set of protocols
that are implemented to limit the access of data (Gill, Kapur & Gill, 2018). Where confidentiality
ensures the security against viewing any data without prior authorization, integrity assures that
the information that has been provided is completely reliable and has not been altered at any
cost.
For affecting the integrity of the data one has to access the information databases and
make changes, whereas the confidentiality of the data is lost even if it is viewed by an
unauthorized third party. Hence, integrity can be maintained while the confidentiality is lost, but

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber-security Assesment Report
|4
|890
|8

Target Data Breach: Threats, Protections, and Legal/Ethical Issues
|8
|1725
|99

CIA Triad, Authorization, Authentication, Ethics, and Security SDLC in Information Technology Management
|6
|1938
|340

Information Assurance and Risk - Desklib
|12
|507
|222

Information Technology - Assignment Solution
|5
|1474
|167

iT Security
|17
|5127
|60